Sun.Nov 05, 2023

article thumbnail

Is 2024 the Year of Federal Data Protection?

Data Breach Today

CMMC, Zero Trust, RMF and NIST SP 800-53 Can Help Mitigate Data Loss, Insider Risk Federal agencies and Defense Industrial Base organizations need to protect data. They can use the CMMC program, the DOD Zero Trust Strategy, the cybersecurity Risk Management Framework and NIST SP 800-53 with built-in security solutions to mitigate data loss and insider risk.

Risk 197
article thumbnail

US govt sanctioned a Russian woman for laundering virtual currency on behalf of threat actors

Security Affairs

The Treasury Department sanctioned a Russian woman accused of laundering virtual currency on behalf of cybercriminals. The Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Friday sanctioned Ekaterina Zhdanova, a Russian national, for her role in laundering and managing virtual currency on behalf of Russian elites, ransomware operators, and other threat actors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lazarus targets blockchain engineers with new KandyKorn macOS Malware

Security Affairs

North Korea-linked Lazarus group is using new KandyKorn macOS Malware in attacks against blockchain engineers. North Korea-linked Lazarus APT group were spotted using new KandyKorn macOS malware in attacks against blockchain engineers, reported Elastic Security Labs. “KandyKorn is an advanced implant with a variety of capabilities to monitor, interact with, and avoid detection.

article thumbnail

Security Affairs newsletter Round 444 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Kinsing threat actors probed the Looney Tunables flaws in recent attacks ZDI discloses four zero-day flaws in Microsoft Exchange Okta customer support system breach impacted 134 customers Multiple WhatsApp mods spotted containing the CanesSpy Spyw

Security 109
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.